Vulnerabilities > Rust Lang > Rust > 1.10.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-04-11 | CVE-2021-28875 | Unchecked Return Value vulnerability in Rust-Lang Rust In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. | 7.5 |
2021-04-11 | CVE-2020-36317 | Out-of-bounds Write vulnerability in Rust-Lang Rust In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. | 7.5 |
2019-09-30 | CVE-2019-16760 | Download of Code Without Integrity Check vulnerability in Rust-Lang Rust Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. | 7.5 |
2018-08-20 | CVE-2018-1000657 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Rust-Lang Rust Rust Programming Language Rust standard library version Commit bfa0e1f58acf1c28d500c34ed258f09ae021893e and later; stable release 1.3.0 and later contains a Buffer Overflow vulnerability in std::collections::vec_deque::VecDeque::reserve() function that can result in Arbitrary code execution, but no proof-of-concept exploit is currently published.. | 7.8 |
2018-07-09 | CVE-2018-1000622 | Uncontrolled Search Path Element vulnerability in Rust-Lang Rust The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. | 7.8 |